scholarly journals Orchestration Architecture for Automatic Deployment of 5G Services from Bare Metal in Mobile Edge Computing Infrastructure

2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Enrique Chirivella-Perez ◽  
Jose M. Alcaraz Calero ◽  
Qi Wang ◽  
Juan Gutiérrez-Aguado

The progress in realizing the Fifth Generation (5G) mobile networks has been accelerated recently towards deploying 5G prototypes with increasing scale. One of the Key Performance Indicators (KPIs) in 5G deployments is the service deployment time, which should be substantially reduced from the current 90 hours to the target 90 minutes on average as defined by the 5G Public-Private Partnership (5G-PPP). To achieve this challenging KPI, highly automated and coordinated operations are required for the 5G network management. This paper addresses this challenge by designing and prototyping a novel 5G service deployment orchestration architecture that is capable of automating and coordinating a series of complicated operations across physical infrastructure, virtual infrastructure, and service layers over a distributed mobile edge computing paradigm, in an integrated manner. Empirical results demonstrate the superior performance achieved, which meets the 5G-PPP KPI even in the most challenging scenario where 5G services are installed from bare metal.

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Enrique Chirivella-Perez ◽  
Juan Gutiérrez-Aguado ◽  
Jose M. Alcaraz-Calero ◽  
Qi Wang

With the advances of new-generation wireless and mobile communication systems such as the fifth-generation (5G) mobile networks and Internet of Things (IoT) networks, demanding applications such as Ultra-High-Definition video applications is becoming ever popular. These applications require real-time monitoring and processing to meet the mission-critical quality of service requirements and are expected to be supported by the emerging fog or edge computing paradigms. This paper presents NFVMon, a novel monitoring architecture to enable flow monitoring capabilities of network traffic in a 5G multioperator mobile edge computing environment. The proposed NFVMon is integrated with the management plane of the Cloud Computing. NFVMon has been prototyped and a reference implementation is presented. It provides novel capabilities to provide disaggregated metrics related to the different 5G mobile operators sharing infrastructures and also about the different 5G subscribers of each of such mobile operators. Extensive experiments for evaluating the performance of the system have been conducted on a mid-sized infrastructure testbed.


Author(s):  
Alberto Huertas Celdrán ◽  
Kallol Krishna Karmakar ◽  
Félix Gómez Mármol ◽  
Vijay Varadharajan

AbstractThe evolution of integrated clinical environments (ICE) and the future generations of mobile networks brings to reality the hospitals of the future and their innovative clinical scenarios. The mobile edge computing paradigm together with network function virtualization techniques and the software-defined networking paradigm enable self-management, adaptability, and security of medical devices and data management processes making up clinical environments. However, the logical centralized approach of the SDN control plane and its protocols introduce new vulnerabilities which affect the security of the network infrastructure and the patients’ safety. The paper at hand proposes an SDN/NFV-based architecture for the mobile edge computing infrastructure to detect and mitigate cybersecurity attacks exploiting SDN vulnerabilities of ICE in real time and on-demand. A motivating example and experiments presented in this paper demonstrate the feasibility of of the proposed architecture in a realistic clinical scenario.


LastMile ◽  
2021 ◽  
Vol 98 (6) ◽  
Author(s):  
A. Ivashkin

Today, many countries around the world are actively building fifth generation mobile networks (5G/IMT-2020). The magazine Last Mile asked the director of the Republican unitary enterprise for supervision on telecommunications "BelGIE" of the Republic of Belarus (hereinafter: State Enterprise "BelGIE") A.A. Ivashkin about the situation with the implementation of the 5G network in the Republic of Belarus.


2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Kai Peng ◽  
Victor C. M. Leung ◽  
Xiaolong Xu ◽  
Lixin Zheng ◽  
Jiabin Wang ◽  
...  

Mobile cloud computing (MCC) integrates cloud computing (CC) into mobile networks, prolonging the battery life of the mobile users (MUs). However, this mode may cause significant execution delay. To address the delay issue, a new mode known as mobile edge computing (MEC) has been proposed. MEC provides computing and storage service for the edge of network, which enables MUs to execute applications efficiently and meet the delay requirements. In this paper, we present a comprehensive survey of the MEC research from the perspective of service adoption and provision. We first describe the overview of MEC, including the definition, architecture, and service of MEC. After that we review the existing MUs-oriented service adoption of MEC, i.e., offloading. More specifically, the study on offloading is divided into two key taxonomies: computation offloading and data offloading. In addition, each of them is further divided into single MU offloading scheme and multi-MU offloading scheme. Then we survey edge server- (ES-) oriented service provision, including technical indicators, ES placement, and resource allocation. In addition, other issues like applications on MEC and open issues are investigated. Finally, we conclude the paper.


2019 ◽  
Vol 63 (2) ◽  
pp. 295-307 ◽  
Author(s):  
Arslan Qadeer ◽  
Asad Waqar Malik ◽  
Anis Ur Rahman ◽  
Hamayun Mian Muhammad ◽  
Arsalan Ahmad

Abstract Cloud adoption has significantly increased using the infrastructure-as-a-service (IaaS) paradigm, in order to meet the growing demands of computing, storage and networking, in small as well as large enterprises. Different vendors provide their customized solutions for OpenStack deployment on bare metal or virtual infrastructure. Among these many available IaaS solutions, OpenStack stands out as being an agile and open-source platform. However, its deployment procedure is a time-taking and complex process with a learning curve. This paper addresses the lack of basic infrastructure automation in almost all of the OpenStack deployment projects. We propose a flexible framework to automate the process of infrastructure bring up for deployment of several OpenStack distributions, as well as resolving dependencies for a successful deployment. Our experimental results demonstrate the effectiveness of the proposed framework in terms of automation status and deployment time, that is, reducing the time spent in preparing a basic virtual infrastructure by four times, on average.


2018 ◽  
Vol 2018 ◽  
pp. 1-18
Author(s):  
Lucas de Melo Guimarães ◽  
Jacir Luiz Bordim

The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G) mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC) schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.


Information ◽  
2019 ◽  
Vol 10 (8) ◽  
pp. 259 ◽  
Author(s):  
Jie Yuan ◽  
Erxia Li ◽  
Chaoqun Kang ◽  
Fangyuan Chang ◽  
Xiaoyong Li

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.


2021 ◽  
Vol 26 (4) ◽  
pp. 417-423
Author(s):  
Indrajeet Kumar ◽  
Manish Kumar Mishra ◽  
Ritesh Kumar Mishra

Non-orthogonal multiple access (NOMA) is a compelling strategy that helps wireless networks of the fifth-generation (5G) to fulfill the diverse demands of increased fairness, high reliability, extensive connectivity, low delay and superior performance. Traditionally, NOMA network presumes perfect transmitter-side channel state information (CSI), which is almost impossible for a number of communication scenarios. Furthermore, this paper contemplates the realistic NOMA downlink method in the Rayleigh fading networks, where the statistical CSI linked with each user is known to the transmitter. We evaluate the outage probability of the proposed model and obtain a closed-form framework of the probability of outage for each user. Besides, the source can optimize the network’s achievable sum-rate for different users based on statistical CSI. The precision of our outage probability analysis and the optimum power allocation algorithm proposed are both verified by the analytical and simulation results.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Dali Zhu ◽  
Ting Li ◽  
Haitao Liu ◽  
Jiyan Sun ◽  
Liru Geng ◽  
...  

Mobile edge computing (MEC) has been envisaged as one of the most promising technologies in the fifth generation (5G) mobile networks. It allows mobile devices to offload their computation-demanding and latency-critical tasks to the resource-rich MEC servers. Accordingly, MEC can significantly improve the latency performance and reduce energy consumption for mobile devices. Nonetheless, privacy leakage may occur during the task offloading process. Most existing works ignored these issues or just investigated the system-level solution for MEC. Privacy-aware and user-level task offloading optimization problems receive much less attention. In order to tackle these challenges, a privacy-preserving and device-managed task offloading scheme is proposed in this paper for MEC. This scheme can achieve near-optimal latency and energy performance while protecting the location privacy and usage pattern privacy of users. Firstly, we formulate the joint optimization problem of task offloading and privacy preservation as a semiparametric contextual multi-armed bandit (MAB) problem, which has a relaxed reward model. Then, we propose a privacy-aware online task offloading (PAOTO) algorithm based on the transformed Thompson sampling (TS) architecture, through which we can (1) receive the best possible delay and energy consumption performance, (2) achieve the goal of preserving privacy, and (3) obtain an online device-managed task offloading policy without requiring any system-level information. Simulation results demonstrate that the proposed scheme outperforms the existing methods in terms of minimizing the system cost and preserving the privacy of users.


Sign in / Sign up

Export Citation Format

Share Document